Due is December 10th.
Please read the instructions CAREFULLY.
Due is December 10th.
Please read the instructions CAREFULLY.
Telecommunication Networks
You are to explore the different web browser forensic tools available, both paid and free. You are to research the different tools available to you, concentrate on free tools, and provide a summary of the tools and how you can use them to perform web browser forensics. You should also note whether the tools can be used on virtual machines.
Your research should include a 3-4 page executive summary paper in APA format, with all supporting references and screen shots of the software you explored that is available for you to use. Eventually you will be providing a video on the software in action and you using the software. The goal is to be able to use the software to conduct the investigation and analysis and provide a final report for testimony, just to give you an idea on where we are heading.
For this assignment, review the article:
Abomhara, M., & Koien, G.M. (2015). Cybersecurity and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm2245-1439.414
and evaluate it in 3 pages (800 words), using your own words, by addressing the following:
When you write your evaluation, be brief and concise, this is not meant to be an essay but an objective evaluation that one can read very easily and quickly. Also, you should include a complete reference (title, authors, journal, issue, pages) you turn in your evaluation.
Your paper should meet the following requirements:
Please request the candidate to have below 2 sets of exercises (Java8 and above) completed by tomorrow and share the GitHub link
1. Selenium WebDriver – Page Object Model:
1. Visit amazon.com Page
2. Search for Book ‘qa testing for beginners’
3. Click on 1st item in the listed results.
4. Before Click on add to cart Add to Cart asset price from Step3.
5. Click on Add to Cart.
6. Before Click on Proceed to Checkout asset price from Step3.
7. Click on proceed to checkout
5. On the checkout page assert price from Step3.
2. API automation using Rest-assured or Karate API Test
1. Use any 2 methods(Get, and Delete) from end-points listed in
http://dummy.restapiexample.com/
2. Perform assertions for
– Get & Delete – Status code to be Successful.
– Get – Return specific Employee details(Any).
– Delete – “message”: “successfully! deleted Records”.
Chapter 3 – Complete the two essay assignments noted below:
Description: The university maintains course schedules at http://appsprod.tamuc.edu/Schedule/Schedule.aspx for different semesters (spring, fall, winter, etc ). You will develop a Python program to dynamically complete certain tasks, such as list, find, sort, and save, in course listings from schedule portal. You will mainly use “request” and “BeautifulSoup” libraries (or similar, see exercise 12.1). The program will operate at different level: Semester and Department. Your program will be a menu based application. Assume that you project file is myproject.py. Once you run, it will show last 5 semester (fall, spring, summer only, (not winter, may mini))
> python myproject.py
Choose a semester: 1) Sprint 2021 2)Fall 2020 3)Summer II 4)Summer I 5)Spring 2020
Selection: 2
Here, your program will parse the data from website and show only last (most recent) 5 semesters. User will make selection, then, you will show departments for the selected semester (Fall 2020). Note that selected semester is visible before a “>” sign.
Fall 2020> Select a department:
1) Undeclared
2) Accounting and Finance
3) Art
4) Ag Science & Natural Resources
…
…
30) Social Work
31) Theatre
Q)Go back
Selection: 3
Fall 2020> Art > Select an option:
1) List courses by instruction name
2) List courses by capacity
3) List courses by enrollment size
4) List courses by course prefix
5) Save courses in a csv file
6) Search course by instruction name
7) Search courses by course prefix
Q)Go back
Selection: ??
Here, your program will parse the data from website and show all available department then list of tasks. Q (go back) option will take user to previous level.
Course listing output should show the following fields. For instance for course listing for “Fall 2020> Computer Science & Info Sys> List the course by prefix ” should show
PrefixIDSecNameInstructorHoursSeatsEnroll.COSC130101WIntro to CompuLee, Kwang33510COSC143601EIntro to Comp Sci & ProgBrown, Thomas44036COSC143601LIntro to Comp Sci & ProgBrown, Thomas4036COSC143601WIntro to Comp Sci & ProgHu, Kaoning44543COSC143602EIntro to Comp Sci & ProgHu, Kaoning43532
as first 5 rows.
You will follow above headers and order (prefix (col. width 6), ID (5), Sec (5) ,Name (25), Inst (20), Hours (5), Seats (5), Enroll. (7) ) for other listing selections too. Data cell should be aligned with column header and left justified. A course name should not have a word more than 5 chars. For instance Algorithms should be abbreviated as “Algor”. The length of course name will not exceed 25 chars. In option 5, the above format should be used to save a listing to a file as .csv format. User will be able to provide a filename for csv file.
For this program you need to develop at least one class (chapter 10) with (possible) many methods.
To help you understand the major differences between blind searching (uniformed search) and heuristic searching (informed search).
Topic of Discussion
Submission Instructions
Assignment:
1. Please give me all the details of considering my role of employee or consumer.
write 4-5 paragraph to justify my role and issue surrounding the design and operation of systems for the functional areas of business because of social media.
2. list down atleast 10 different points to allow me speak in discussion.
Engage: Join your classmates for a live discussion on this film.
Current Events: Watch a Netflix Film “The Social Dilemma” and consider your role in the world of social media employee or consumer.
Consider well the use of social media systems within the functional areas of business.
Deeper into a few issues surrounding the design and operation of systems for the functional areas of business.
This discussion will focus on SM within organizations – cost, commitment, champion or catastrophe.
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.
The course mentioned here is INTRODUCTION TO DATA MINING
Current work is Software Developer
Textbook :
Title: Introduction to Data Mining
ISBN: 9780133128901
Authors: Pang-Ning Tan, Michael Steinbach, Anuj Karpatne, Vipin Kumar
Publisher: Addison-Wesley
Publication Date: 2013-01-01
Edition: 2nd ED.